General

  • Target

    2025-04-21_80cd482b4e6cb45cd9ae60768d968ad6_akira_black-basta_coinminer_elex_hijackloader_icedid_rhadamanthys

  • Size

    12.5MB

  • Sample

    250421-3nq46s1q14

  • MD5

    80cd482b4e6cb45cd9ae60768d968ad6

  • SHA1

    003c7a9435a6507bfb57999a1d478b92e2ba77c0

  • SHA256

    106f634846a40cf1b0cfd8a00be2f847c97199c55d7f412a00fb939067f88edd

  • SHA512

    d45c427806e5cf1b9d170bb6dc9de6b62497d61de1bce2220a6ddf0ef1995db675ad7d8a848b4a4d205173f63bd4a0bd599b99b0d779c2789086bebe583687df

  • SSDEEP

    98304:iy9aIh+gco1pKsPW3sSJZsRgajjXMgUlG8dr87GweHa7zlvKOZ5zv7gLd:Vhr1I2WcqKjj7UlG8drCeqBvKCzcL

Malware Config

Targets

    • Target

      2025-04-21_80cd482b4e6cb45cd9ae60768d968ad6_akira_black-basta_coinminer_elex_hijackloader_icedid_rhadamanthys

    • Size

      12.5MB

    • MD5

      80cd482b4e6cb45cd9ae60768d968ad6

    • SHA1

      003c7a9435a6507bfb57999a1d478b92e2ba77c0

    • SHA256

      106f634846a40cf1b0cfd8a00be2f847c97199c55d7f412a00fb939067f88edd

    • SHA512

      d45c427806e5cf1b9d170bb6dc9de6b62497d61de1bce2220a6ddf0ef1995db675ad7d8a848b4a4d205173f63bd4a0bd599b99b0d779c2789086bebe583687df

    • SSDEEP

      98304:iy9aIh+gco1pKsPW3sSJZsRgajjXMgUlG8dr87GweHa7zlvKOZ5zv7gLd:Vhr1I2WcqKjj7UlG8drCeqBvKCzcL

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks